Jump to ContentJump to Main Navigation
China and CybersecurityEspionage, Strategy, and Politics in the Digital Domain$
Users without a subscription are not able to see the full content.

Jon R. Lindsay, Tai Ming Cheung, and Derek S. Reveron

Print publication date: 2015

Print ISBN-13: 9780190201265

Published to Oxford Scholarship Online: April 2015

DOI: 10.1093/acprof:oso/9780190201265.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (oxford.universitypressscholarship.com). (c) Copyright Oxford University Press, 2020. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 01 December 2020

Civil-Military Integration and Cybersecurity

Civil-Military Integration and Cybersecurity

A Study of Chinese Information Warfare Militias

(p.188) Chapter 8 Civil-Military Integration and Cybersecurity
China and Cybersecurity

Robert Sheldon

Joe McReynolds

Oxford University Press

This chapter assesses Chinese civil-military integration in the context of operations in the cyber domain, focusing particularly on the development of cyberwarfare capabilities in China’s militia forces. It surveys the major categories of civil-military integration in the network domain, focusing on China’s operational, rather than technical, capabilities. The focus is on Chinese information warfare militia units and network warfare subunits as a component of China’s efforts to utilize civilian capabilities in developing its computer network operations capacity. The chapter describes the characteristics of information warfare militia units and their role in civil-military integration. Then, it discusses and analyzes a fifty-unit sample of information warfare militia units and network warfare subunits throughout China and present two case studies. The remainder of the chapter offers some areas for additional research, identifies some conclusions, and offers several policy implications.

Keywords:   cyber militia, People’s Liberation Army, civil-military integration, cybersecurity, China, computer network operations, cyberwarfare

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .